Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
The Federal Communications Commission’s (“FCC”) net neutrality proceeding culminated this month with the release of an Order reclassifying broadband Internet access service as a common carrier Telecommunications Service...more
On 24 March, the Court of Justice for the European Union (CJEU) heard argument on a case that could significantly impact, if not invalidate altogether, the Safe Harbor framework that facilitates the flow of personal data from...more
Yesterday, the Schrems v. Irish Data Protection Commission case was brought before the Court of Justice of the European Union (‘CJEU’) for an oral hearing, following referral by the Irish High Court. While the final ruling by...more
With the news of the recent cyber-attack and resulting data breach at health insurance giant Anthem Inc., the buzz around data security and privacy is again high. The Anthem breach serves as a reminder to those entities...more
The federal government may be pushing a cybersecurity and data privacy agenda, but that doesn’t mean that the states are taking a back seat. The state attorneys general are maintaining their focus on issues relating to...more
Health care is always a major issue in Washington, DC but recently how to promote innovation in medtech has become a priority within that conversation. Thus far, 2015 has produced a major legislative initiative in the form of...more
The NAIC has begun its efforts to amp up state insurance department oversight of cybersecurity practices with the release of two documents for public comment. The first, entitled Principles for Effective Cybersecurity...more
The National Institute of Standards and Technology (“NIST”) recently posted a preliminary discussion draft of its forthcoming Framework for Cyber-Physical Systems (a term used interchangeably with the Internet of Things, or...more
On 1st January 2015 amendments to the Polish Data Protection Act of 29th August 1997 came into force. These amendments (the “Amendments”) impact: (i) the role played by the “administrator bezpieczenstwa informacji,” (“DPO”)...more
On March 12, 2015, the Federal Communications Commission (FCC or “Commission”) released the full text of its Open Internet Order (“Order”). The rules adopted in the Order will become effective 60 days after publication in the...more
We’re a bit behind on this, but better (a little bit) late than never. Last month the SEC’s Office of Compliance, Inspections and Examinations released the first results of its Cybersecurity Examination Initiative, announced...more
Action Item: Benjamin Lawsky, the Superintendent of Financial Services for New York State, one of the country’s most aggressive regulators, is seeking to increase regulatory pressures on the financial services industry,...more
On March 9, 2015, the U.S. Food and Drug Administration (FDA) published a draft guidance that allows for the use of electronic informed consent (eIC) in human clinical trials. eICs have the potential to...more
Colleges and universities across America have recognized that unmanned aerial vehicles (UASs) – also known as drones -- have broad academic applications. Indeed, the Federal Aviation Administration reports that of the 900...more
Today the Food and Drug Administration (FDA) published a notice announcing the availability of a draft guidance document entitled “Use of Electronic Informed Consent in Clinical Investigations: Questions and Answers.” The...more
On February 3, 2015, the Securities and Exchange Commission’s (“SEC”) Office of Compliance Inspections and Examinations (“OCIE”) published a highly-anticipated summary of its examination sweep of 57 registered broker-dealers...more
The FTC seems more confident than ever in its authority to go after companies with insufficient data security measures. As of January 2015, it had settled 53 data-security enforcement actions, and FTC Senior Attorney Lesley...more
Does your company give employees access to company email? Do you prohibit employees from using the company email for personal, non-company use? If so, your policy may violate federal law....more
For many companies, the prospect of a dreadful, costly and reputation-damaging cyber-attack and data breach is all the motivation they need to assess and improve their cyber security and data protection posture RIGHT NOW. ...more
After much anticipation, the Third Circuit heard oral arguments (audio) last Tuesday in the interlocutory appeal in FTC v. Wyndham Worldwide Corp. We have written previously about this case, which likely will be a significant...more
On 28 January 2015, the Financial Conduct Authority (FCA) published the Memorandum of Understanding (MoU) which it entered into with the Information Commissioner’s Office (ICO) (dated 29 September 2014)....more
This is an update to an article we posted on January 28, Can Hotels Legally Block Wi-Fi Hot Spots? The FCC Says No, and Fines a Hotel $600,000 For Doing It.
On August 25, 2014, the American Hotel & Lodging Association,...more
On February 25, the White House issued a fact sheet regarding the establishment of the Cyber Threat Intelligence Integration Center (CTIIC), which outlines the purpose, authority, organizational structure, and how the CTIIC...more
2014 saw a large number of significant developments in data privacy laws across Asia-Pacific. However, unsurprisingly there has not been a consistent approach across Asia-Pacific towards the development of data privacy...more
The Spanish Ministry of Industry, Energy and Tourism will finance up to 80% of 13 projects linked to the development of smart cities, from which 27 Spanish cities are expected to benefit....more
Find a Science, Computers & Technology Author »
Back to Top